Handbook of Biometric Anti-Spoofing

  title={Handbook of Biometric Anti-Spoofing},
  author={S. Marcel and M. Nixon and S. Li},
  booktitle={Advances in Computer Vision and Pattern Recognition},
  • S. Marcel, M. Nixon, S. Li
  • Published in
    Advances in Computer Vision…
  • Engineering, Computer Science
  • Presenting the first definitive study of the subject, this Handbook of Biometric Anti-Spoofing reviews the state of the art in covert attacks against biometric systems and in deriving countermeasures to these attacks. Topics and features: provides a detailed introduction to the field of biometric anti-spoofing and a thorough review of the associated literature; examines spoofing attacks against five biometric modalities, namely, fingerprints, face, iris, speaker and gait; discusses anti… CONTINUE READING
    50 years of biometric research: Accomplishments, challenges, and opportunities
    • 291
    • Open Access
    A review of iris anti-spoofing
    • 16
    • Open Access
    Presentation Attack Detection Methods for Face Recognition Systems
    • 92
    • Open Access
    Reliable face anti-spoofing using multispectral SWIR imaging
    • 38
    Face anti-spoofing using Haralick features
    • 37
    • Open Access


    Publications referenced by this paper.
    On the effectiveness of local binary patterns in face anti-spoofing
    • 463
    • Open Access
    Handbook of Biometrics
    • 773
    • Highly Influential
    An Analysis of Minutiae Matching Strength
    • 422
    • Highly Influential
    • Open Access
    Robustness of multimodal biometric fusion methods against spoof attacks
    • 169
    • Highly Influential
    • Open Access
    A face antispoofing database with diverse attacks
    • 373
    • Open Access
    Face spoofing detection through partial least squares and low-level descriptors
    • 86
    • Open Access
    Face spoofing detection from single images using micro-texture analysis
    • 431
    • Open Access
    Computationally Efficient Face Spoofing Detection with Motion Magnification
    • 185
    • Highly Influential
    • Open Access
    Verifying liveness by multiple experts in face biometrics
    • 116
    • Highly Influential
    • Open Access
    Motion-based counter-measures to photo attacks in face recognition
    • 107
    • Open Access